Arrest of Pavel Durov, Telegram CEO, charges of terrorism, fraud, child porn

Cryptocurrency addresses and transaction IDs are strings of letters and numbers, starting with 0x, bc1, 1b, or T. Examples include a Bitcoin transaction ID (236a5180d128dc41181e14bcb5f28f6a9dcfa2503b7452f38915dc6ecb4a26f2) and a Tron wallet address (TXXoBzvAW5pzHWTJ2xvou6TUZFvT1reHFc).

Is Telegram really an encrypted messaging app?

https://blog.cryptographyengineering.com/wp-content/uploads/2024/08/52770168096_a43776424c_k.jpg?w=1200
Telegram's CEO Pavel Durov was arrested for failing to sufficiently moderate content, and the author argues that the company's lack of default end-to-end encryption is a major issue. The author criticizes Telegram's encryption protocols, calling them "unusual" and "non-standard", and notes that the company's failure to improve its encryption UX is concerning.

Lidl's Cloud Gambit: Europe's Shift to Sovereign Computing

https://miro.medium.com/v2/resize:fit:836/1*ZYNUYfZ4HgytTjDHE0C1BA.jpeg
Lidl, a European discount retailer, has spun off its internal IT unit, Schwarz Digits, into a standalone cloud computing division, competing with AWS and others. This move is part of a broader trend in Europe towards sovereign cloud computing, driven by demand for cloud services that prioritize privacy, data protection, and regional control.

Study: Air purifier use at daycare centres cut kids' sick days by a third (2023)

https://images.cdn.yle.fi/image/upload/c_crop,h_2792,w_4965,x_12,y_268/ar_1.7777777777777777,c_fill,g_faces,h_431,w_767/dpr_1.0/q_auto:eco/f_auto/fl_lossy/v1701098302/39-117653765115d5c4f6c1
Air purifiers in two Helsinki daycare centers reduced illnesses and absences by 30% among children and staff, according to preliminary study findings. The study aims to develop an air purification scheme for daycare centers, reducing the spread of pathogens and potential savings for employers.

Strandbeest

Theo Jansen creates strandbeests, skeletons made from plastic tubes that walk and get energy from wind, with 12 periods of evolution since 1990. He aims to understand nature by encountering its problems, with updates on events on stories, Instagram, Facebook, and YouTube.

Writing a Rust compiler in C

https://notgull.net/images/rustc-in-rust.png
The author is working on a Rust compiler written in pure C, without C++, to bootstrap Rust from C, aiming to create a crowning achievement. The project, called Dozer, is challenging, but the author believes it's better to try and potentially fail than not try at all.

Anthropic Claude 3.5 can create icalendar files, so I did this

https://cdn.hashnode.com/res/hashnode/image/upload/v1724550508637/b7807f68-6a22-45bc-85f0-78faadcaec63.jpeg?auto=compress,format&format=webp
You asked Claude to create an iCalendar file with 13 appointments for "Jazz Piano Lesson" on specific Fridays at 2pm Pacific Time. The file was successfully imported into your Google Calendar, and you also received Python code to create the iCalendar file manually.

Vim Racer

Vim-racer is a game that tests navigation skills through text using Vim motions, with the goal of reaching targets quickly. The game has a leaderboard and provides tips and key sequences to help users learn new Vim motions and improve their navigation skills.

Linux Pipes Are Slow

https://qsantos.fr/wp-content/uploads/2020/07/profil.jpg
The author is investigating why Linux pipes are slower than expected, particularly when not using the vmsplice system call, and aims to understand the performance gain achieved by using vmsplice in programs like Fizz Buzz. The author finds that the kernel's copy_user_enhanced_fast_string function is not using SIMD instructions, leading to a 10x slowdown, and that vmsplice bypasses this ...

TIL: Versions of UUID and when to use them

UUIDs have 8 versions, each with its own use case, such as generating random IDs (v4), sorting IDs (v7), or incorporating custom data (v5 or v8), with v4 being a good default choice. The choice of UUID version depends on the specific use case, with v4 and v7 being the most commonly used, and v5 or v8 being used when custom data is required.

Database “sharding” came from Ultima Online? (2009)

Cookies are categorized into necessary, functional, performance, analytical, advertisement, and uncategorized types, each serving a specific purpose. These cookies help ensure website functionality, user experience, and targeted advertising, while also collecting visitor data and metrics.

Rnote – Sketch and take handwritten notes

https://raw.githubusercontent.com/flxzt/rnote/main/crates/rnote-ui/data/icons/scalable/apps/rnote.svg
Rnote is an open-source vector-based drawing app for sketching, handwritten notes, and annotating documents and pictures, offering features like infinite canvas, adaptive UI, and export options. The app has some known issues, such as permissions and stylus button problems, and contributors can help by translating the app or submitting bug fixes.

Police Chief Says Cops Have a 5th Amendment Right to Leave Body Cameras Off

https://d2eehagpk5cl65.cloudfront.net/img/c800x450-w800-q80/uploads/2024/03/Harold-Medina-APD-800x450.jpg
Albuquerque Police Chief Harold Medina was involved in a car crash while driving his department-issued pickup truck, which was deemed "non-preventable" by the department's Fleet Crash Review Board, but an internal investigation found Medina's actions were reckless and unsafe. Medina received two official reprimands for the crash and for not activating his body camera, which he claimed was due ...

Facebook Banned Me for Life Because I Help People Use It Less (2021)

https://compote.slate.com/images/814f2912-cf45-4865-9538-639d858a93a6.jpeg?crop=5184%2C3456%2Cx0%2Cy0
Facebook sent a cease-and-desist letter to the creator of a browser extension called Unfollow Everything, which allowed users to delete their News Feed, and permanently disabled the creator's Facebook and Instagram accounts. The creator believes Facebook's actions are anti-consumer and anti-competitive, and that the company is trying to stifle user choice and innovation by using its terms of ...

The art of programming and why I won't use LLM

You disagree with the hype surrounding Large Language Models (LLMs) in coding, believing they overcomplicate the creative process and reduce programming to mere automation. You see programming as an art form, and using LLMs to write code is like asking an artist to paint for you, taking away the joy and self-expression that comes with creating code yourself.

Finding a therapist who takes your insurance can be nearly impossible

https://media.npr.org/chrome/ext_provider_199135797.gif
Over 500 therapists and mental health professionals have left insurance networks due to insurers' restrictive coverage, delayed payments, and interference with patient care, leading to a shortage of available therapists and making it difficult for people with mental illness to access treatment. Insurers' reimbursement rates for mental health clinicians are also low, with many providers ...

Ruby in Jupyter Notebook

http://ipython.org/ipython-doc/dev/_images/ipynb_icon_128x128.png
IRuby is a Ruby kernel that integrates with Rubygems and provides a web notebook interface for programming presentations. It includes methods for displaying objects, creating LaTeX and HTML representations, and using Pry as an enhanced Ruby REPL.

Pi Pico 2 Extreme Teardown

http://img.youtube.com/vi/MkWPlpOu2sk/0.jpg
Raspberry Pi released the RP2350 with a new Pico 2 assembly, featuring a buck-boost power supply and a choice between ARM M33 and RISCV Hazard 3 cores. The RP2350's design allows customers to switch between architectures, with a larger die size and "hard-macros" for bought-in IP blocks.

Stripe Data vs. Open‐Source Alternatives: A MRR Example

https://private-user-images.githubusercontent.com/85290767/278263692-7d162323-cae7-4080-8727-288272a55175.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.j20V1XTRzZbm2x1Z-b57qkirZURpKggCYGzNyiqvwYk
Stripe's API does not provide a straightforward way to calculate MRR, making it difficult for companies to access and analyze their financial data. This limitation can be overcome by using third-party tools or building a custom billing solution, but it can be expensive and may not be suitable for all companies.

Neurotechnology numbers worth knowing (2022)

https://milan.cvitkovic.net/images/thumbnail.png
The text is a collection of numbers worth knowing for those working in neurotechnology, covering various topics such as biology, physiology, and technology. The numbers range from the covalent radius of elements to the cost of developing a new drug, providing a comprehensive reference for neurotechnology professionals.

Looming Liability Machines (LLMs)

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu7wbyNklGJSrFBgwWvytde4zWr00DqBpM_uusD-YJZABk50a8eu21vI-lY-okTFhxFBAFAdkldB4xmyoGPmzuxJ2Ku4EE4Wk1F07ATfAtfdDjFJbUZSmFD8Id4_9UuHdny4PIRI4PUffxjoiwd2Lgtqx1QnPOOQu9JNvJYh4pdGUrxAd2wI6V3qNN6d4/w640-h365/Screenshot%202024-08-19%20at%208.34.42%E2%80%AFPM.png
The author discusses the potential risks and limitations of using Large Language Models (LLMs) for automatic root cause analysis (RCA) in cloud incidents, citing concerns about the lack of human expertise and the potential for superficial results. They also express worries about the potential decline in developing new experts in safety engineering and the automation surprise problem that may ...

Postgres as a Search Engine

https://anyblockers.com/og/posts/postgres-as-a-search-engine.png
The article discusses building a robust search engine using Postgres, combining full-text, fuzzy, and semantic search techniques to improve search results. It provides a step-by-step guide on how to implement these techniques, including using CTEs, GIN-indexes, and pgvector for semantic search.

Ruby's official documentation just got a new look

If Your World Is Not Enchanted, You're Not Paying Attention

https://substackcdn.com/image/fetch/w_120,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d5559a5-43cd-4cbe-ae78-70dba7893273_1242x1706.png
The author explores the concept of enchantment and its relation to attention, suggesting that enchantment is an effect of a certain quality of attention and that our experience of the world as disenchanted may be due to our habituation against this kind of attention. The author argues that cultivating attention and a sense of wonder can lead to a more richly personal and relational experience ...

Olivetti Programma 101: At the Origins of the Personal Computer

https://www.inexhibit.com/wp-content/uploads/2017/02/Olivetti-Programma-101-computer.jpg
Olivetti's Programma 101, released in 1965, was the first human-centered computer, designed to be small, user-friendly, and affordable. It was a revolutionary innovation that set the stage for personal computers, with its magnetic card reader/recorder, custom programming language, and futuristic design.

Big Pharma claims lower prices means giving up miracle medications. Ignore them

https://platform.vox.com/wp-content/uploads/sites/2/2024/08/GettyImages-2163308489.jpg?quality=90&strip=all&crop=0.0043959908563451%2C0%2C99.991208018287%2C100&w=2400
The US government has negotiated directly with pharmaceutical companies to set prices for a handful of drugs, aiming to cap out-of-pocket expenses for Medicare patients at $2,000 per year. Despite concerns that price controls will stifle innovation, experts argue that the industry is already profitable and that AI can help identify promising drug candidates, potentially reducing costs without ...

How de-Googled is Lineage OS?

The author, who is trying to remove all trace of Google from their life, discusses the privacy concerns of using Lineage OS, a Google-free Android operating system, and explores various data leaks and potential privacy breaches. While the author acknowledges that Lineage OS is not perfect and still sends some data to Google, they believe that it is a reasonable compromise and prefer it over ...

Telegram abides by EU laws, including the Digital Services Act

https://abs.twimg.com/responsive-web/client-web/icon-ios.77d25eba.png
Telegram follows EU laws and industry standards for moderation, constantly improving. It's absurd to hold the platform or its owner responsible for abuse, with almost a billion users relying on it for communication and vital information.

Why Does Elisp Suck

The author discusses the perceived flaws of EmacsLisp, including its lack of lexical scoping, concurrency, and object-oriented programming, and argues that these limitations make it difficult to write large and complex programs. However, the author also acknowledges the unique strengths of EmacsLisp, such as its ability to be used as an extension language for Emacs, and suggests that it could ...

Deliberate Practice and Acquisition of Expert Performance: A General Overview

onlinelibrary.wiley.com needs to review the security of your connection before proceeding.

Programming terrain from scratch using C++ and OpenGL by Shamus Young (2006)

https://www.shamusyoung.com/twentysidedtale/images/terrain1.jpg
The author is building a terrain engine from scratch, aiming to create realistic overhead views, using C++ and OpenGL. The first step involves setting up a project, creating a grid-based terrain, and rendering it, with plans to optimize and add features in future updates.

The Tao of Unicode Sparklines (2021)

https://i0.wp.com/jonudell.info/images/sparkline-sample.jpg?w=656&ssl=1
The author uses Unicode sparklines to visualize activity over time in Metabase, creating a function in Postgres to generate sparklines from arrays of numbers. The sparklines are used to show patterns of variation in annotation activity across courses, with the ability to sort and contextualize the data.

From Datalog to SVG

https://inconvergent.net/img/writing/graph/20231023-192938.png
The user is working with generative algorithms and has developed a Datalog query language to query graphs in an in-memory graph data structure, allowing for more convenient storage and retrieval of results. They have also created a DSL for drawing SVGs directly from Datalog queries, enabling the export of graph data to a .grph file that contains the logic used to draw it.

Things I Learned from Doing Triathlon in My 70s (2023)

https://cdn.triathlete.com/wp-content/uploads/2023/05/Featured-8.jpg?crop=1:1&width=100
The author, a 71-year-old Ironman triathlete, shares his experiences and insights on aging, emphasizing the importance of acknowledging reality, asking "how can I?" instead of "can I?", and finding joy in the journey. He reflects on the lessons he's learned, including the value of rest, not proving oneself, and appreciating the wisdom and freedom that come with age.

Sticker on caption phone says that using the captions can be illegal. Why?

https://i.sstatic.net/w3ubqiY8.jpg
The user found a captioned phone with a loudness warning and wondered why captioning a phone call is illegal if not needed for disability accommodation, suspecting concerns around eavesdropping or wiretapping. The user learned that the Federal Communications Commission (FCC) prohibits non-disabled individuals from using captioned phone services, as the service is subsidized by the government ...

All Texts in Brooklyn

https://brooklyn.alltexts.nyc/_next/image?url=%2Fassets%2FAdobeStock_260763457-cropped.jpeg&w=3840&q=50
Explore Brooklyn's urban landscape through text. Search and visualize every sign, notice, and street art captured in street images in this unique digital archive of NYC typography.

Essays: NSA Surveillance: A Guide to Staying Secure – Schneier on Security

https://149400697.v2.pressablecdn.com/wp-content/uploads/2019/10/Bruce-Schneier.jpg
The NSA eavesdrops on internet communications by collecting network traffic, metadata, and attacking endpoint computers, and individuals can protect themselves by using encryption, hiding in the network, and being suspicious of commercial encryption software. To remain secure, individuals should implement hidden services, use TLS and IPsec, assume their computer can be compromised, and use ...

European iPhones are more fun now

https://duet-cdn.vox-cdn.com/thumbor/0x0:2040x1360/2400x1600/filters:focal(1020x680:1021x681):format(webp)/cdn.vox-cdn.com/uploads/chorus_asset/file/24931352/236792_iPhone_15_Pro_and_15_Pro_Max_product_photos_AJohnson_0008.jpg
Apple is offering more features and customization options on iPhones in Europe, but not globally, due to regulatory differences. The author argues that it would be good business to offer the same choices worldwide, making the iPhone more fun and flexible for all users.

Serpent OS Pre-Alpha-0 released

https://serpentos.com/static/img/blog/prealpha0-released/prealpha0.png
The technical preview of Serpent OS, prealpha0, is available for testing, featuring a minimal GNOME desktop and CLI installer, but not recommended for daily use due to its early nature and outdated packages. The OS uses the moss package manager, which provides a stateless design and deduplicated OS content, allowing for atomic updates and offline rollbacks.

Can you convert a video to pure CSS?

https://dgerrells.com/images/video-to-css.png
The author discusses converting videos into pure CSS animations, exploring techniques such as CSS scroll animations and box shadow rendering. They also create an app to convert videos into CSS strings and GIFs, emphasizing the importance of style over substance in web design.

Emulating the Early Macintosh Floppy Drive

https://thomasw.dev/assets/posts/mac/floppyq.png
The IWM (Integrated Woz Machine) controller interfaces with the 68000 CPU to manage disk drives, with various registers and signals controlling drive operations. The IWM is used in early Macintosh computers, including the 128K and 512K models, and its implementation requires careful attention to timing and signal control to ensure proper disk drive operation.

How a flawed idea is teaching kids to be poor readers (2019)

https://img.apmcdn.org/6604c4cf06fa65caba2da7b62782f50a78cdf883/uncropped/c91a65-20190717-at-a-loss-for-words-600.jpg
The three-cueing system, a widely used approach to teaching reading, has been debunked by decades of scientific research, which shows that it can actually hinder children's ability to become skilled readers. Instead, explicit phonics instruction and building oral vocabulary and background knowledge are essential components of effective reading instruction, and Oakland's pilot project is ...

An AWS IAM Security Tooling Reference

https://ramimac.me/assets/images/iam-tools.png
AWS IAM is crucial for security but complex, with tools like Zelkova, IAM Access Analyzer, and IAM Access Advisor helping to identify and manage permissions. Various open-source tools, such as PMapper, Cloudsplaining, and Parliament, provide additional features like graph-based modeling, linting, and formal proof to help reason about and secure AWS IAM permissions.

BuffDB is a Rust library to simplify multi-plexing on edge devices

https://camo.githubusercontent.com/a5f1430e322be82593583af53e64c9903c28ad05972d4d352214be407353071b/68747470733a2f2f73696d2e6275696c642f6173736574732f696d616765732f696d61676530322e706e673f763d6433303066613764
BuffDB is a lightweight, high-performance persistence layer for gRPC written in Rust, designed for environments with limited bandwidth and critical performance. It provides a set of commands for storing and retrieving data, and can be used as a library or a standalone server.

Pavel Durov and the Blackberry Ratchet

https://www.oblomovka.com/images/head3.jpg
Governments target companies and executives of services with weakly encrypted tools, such as Telegram, because they can technically assist authorities in some ways but not others, leading to political pressure and public threats. This is similar to the situation with Blackberry in the 2000s, where governments attacked RIM for not cooperating fully with their requests, despite the company's ...

Speeding Up Your Website Using Cloudflare Cache

https://pillser.com/engineering/2024-08-25-speeding-up-your-website-using-cloudflare-cache/image.png
Cloudflare's caching feature, including Tiered Cache and Cache Reserve, significantly improves website performance by reducing server hops and caching gigabytes of data. The user shares their experience with configuring Cloudflare cache, including setting Cache Rules, ETags, and Edge TTL, and notes the importance of purging the cache and revalidating stale content.

Transferring energy from nitrogen to argon enables 2-way cascaded lasing in air

https://scx1.b-cdn.net/csz/news/800a/2024/a-mechanism-that-trans.jpg
Researchers at UCLA and Max Born Institute discovered a new mechanism that enables bidirectional, two-colored, cascaded lasing in atmospheric air by transferring energy from nitrogen to argon. This mechanism could lead to the development of remote sensing technologies and has the potential to achieve backward air lasing, a long-standing research goal in the physics community.

In pre-WWII Berlin, the shape of your roof was a political decision

https://img.atlasobscura.com/w8vygn1bpFGMAuthtBbTdsJBHwxuPkGz62s8_iQIa-g/rs:fill:600:400:1/g:ce/q:81/sm:1/scp:1/ar:1/aHR0cHM6Ly9hdGxh/cy1kZXYuczMuYW1h/em9uYXdzLmNvbS8y/MDE5LzAzLzI1LzE4/LzQyLzI5LzM4NDBi/ZjVmLWE4NmUtNDY1/ZS1hNGFkLWZjY2I4/NGM0YTYwYy9QUklO/VElORyBQTEFURV9G/aW5hbF93aXRoR0ZY/ICgwLTAxLTQ1LTE2/KS5qcGc.jpg
In the 1920s, a "roof war" erupted in Berlin's Zehlendorf neighborhood between flat-roofed and pitched-roofed housing developments, symbolizing the deeper conflicts of the Weimar Republic. The debate, which pitted left-wing and right-wing groups against each other, ultimately coalesced into a listed historic district, with flat and pitched roofs coexisting for nearly 90 years.

A Technical Look at BitMessage: Learning From a Dead Project

https://zolagonano.github.io/assets/pics/prefix_filter_streams_hierarchy.png
Bitmessage is a decentralized and private messaging system that was abandoned but still has value in its innovations and lessons learned. Despite its limitations, the project's dedication to privacy and freedom has paved the way for future developments in decentralized communication, and studying its architecture and design can help improve similar projects.

Los Angeles is in a 4-year sprint to deliver a car-free 2028 Olympics

https://images.theconversation.com/files/614367/original/file-20240819-17-f65gg0.jpg?ixlib=rb-4.1.0&rect=0%2C7%2C4992%2C3323&q=20&auto=format&w=320&fit=clip&dpr=2&usm=12&cs=strip
The 2028 Olympics in Los Angeles aim to be "car-free" but this seems optimistic given the city's car-centric culture, which has been shaped by the demise of its electric streetcar system in the 1940s. Despite efforts to rebuild a more robust public transportation system, it is likely that LA will revert to its car-centric ways after the Games end.

Y Combinator backs its first defense startup, Ares Industries

https://techcrunch.com/wp-content/uploads/2024/08/ares-industries-in-brief.jpg?w=1280
Ares Industries, a startup backed by Y Combinator, aims to build low-cost cruise missiles, while Telegram founder Pavel Durov was arrested in France. Other news includes Apple's upcoming product launch, a cyberattack on the Port of Seattle, and funding rounds for various startups.

Apple Approves iDOS Emulator

https://duet-cdn.vox-cdn.com/thumbor/0x0:3000x2000/2400x1600/filters:focal(1500x1000:1501x1001):format(webp)/cdn.vox-cdn.com/uploads/chorus_asset/file/23925967/acastro_STK045_02.jpg
Apple has approved PC emulator apps on the App Store, allowing the DOS emulator iDOS 3 to be downloaded after initially being rejected. The change in policy follows Apple's addition of "PC emulator" to guideline 4.7 and the approval of another PC emulator app, UTM SE, in July.

Show HN: Z80 Sans

https://raw.githubusercontent.com/nevesnunes/z80-sans/master/test/1.gif
The text describes a font that converts hexadecimal characters into Z80 instructions using OpenType's Glyph Substitution Table and Glyph Positioning Table. The font uses a programmatic solution, including a recursive descent parser, to generate all possible glyphs and evaluate expressions in encodings.

Scientists achieve more than 98% efficiency removing nanoplastics from water

https://showme.missouri.edu/wp-content/uploads/2024/08/20240724_NIT-Gary-Baker-SEO-0011-940x627.jpg
University of Missouri scientists have developed a liquid-based solution that eliminates over 98% of nanoplastics from water, a breakthrough in addressing the growing issue of nanoplastic pollution. The innovative method uses water-repelling solvents made from natural ingredients to absorb and remove nanoplastics from water, paving the way for further research and development in advanced ...

A Weekend at the Immersion Larp Festival

https://mssv.net/wp-content/uploads/2024/08/press-3.jpg?w=1024
The author attended the Immersion festival, a Nordic larp event, and experienced three larps: Seaside Prison, Cherry, Dust, Chair!, and Monet and the Moment. The author found the larps to be immersive and engaging, with a focus on collaborative gameplay, workshops, and transparency of expectations.

4.6M Voter and Election Documents Exposed Online by Technology Contractor

https://www.vpnmentor.com/wp-content/uploads/2024/08/4-6-million-voters_optimized.png
A cybersecurity researcher discovered 13 non-password-protected databases containing 4.6 million documents, including voter records, ballots, and election-related records, which were exposed for approximately 10 days. The researcher reported the finding to the relevant parties, and the databases were eventually restricted, highlighting the importance of data protection and security in election systems.

Acorn – Use Laravel Inside WordPress

https://roots.io/dist/images/sponsors/wordpress-com.8aa0d3.svg
Acorn allows loading a Laravel app container within WordPress, respecting WordPress's lifecycle and template hierarchy. It also provides WP-CLI commands for creating components, service providers, and more, making it easy to use Laravel packages in WordPress themes and plugins.

Apple explores robotics in search of life beyond the iPhone

https://assets.bwbx.io/images/users/iqjWHBFdfxIU/iKMg92yfL.RI/v1/-1x-1.jpg
Connecting decision makers to a dynamic network of information, people and ideas, Bloomberg quickly and accurately delivers business and financial information, news and insight around the world Connecting decision makers to a dynamic network of information, people and ideas, Bloomberg quickly and accurately delivers business and financial information, news and insight around the world

Programming with ChatGPT

https://henrikwarne.com/wp-content/uploads/2024/08/img_20240814_200343.jpg?w=1024
You use ChatGPT to generate code tailored to your specific needs, which has significantly boosted your productivity and allows you to work in small steps, modifying queries as needed. You find ChatGPT's code generation to be almost perfect for programming, as you always test the result and hallucinations are rare, making it a valuable tool for programmers.

MavenGate gets it all wrong and hurts open source

MavenGate claims some Maven namespaces are vulnerable to hijacking, but the list lacks clear criteria for inclusion, and the actual vulnerability lies with Maven repositories' failure to verify namespace ownership and PGP key links. The proposed solution to switch to a new namespace is unreasonable and may deter individuals from publishing open source due to the high bar and costs involved.

The Power of Attraction: How Beauty Influences Startup Investments

https://www.unisg.ch/fileadmin/_processed_/b/2/csm_Attraktivitaet-von-Gruenderinnen_AdobeStock_Anton_Gvozdikov_450516880_dd8ec4552b.jpeg
Female entrepreneurs face biases in venture capital investments, with attractive founders perceived as more competent and receiving 21% more investments. The study found that the halo effect and cortisol levels of investors also play a significant role in startup investments, highlighting the need for a fair and equal investment environment.

NASA's Starliner decision was the right one, but it's a crushing blow for Boeing

https://cdn.arstechnica.net/wp-content/uploads/2024/08/starliner1-800x533.jpeg
NASA has decided not to fly the Boeing Starliner spacecraft with astronauts onboard due to thruster failures and helium leaks, and instead will use a SpaceX Crew Dragon spacecraft to return the astronauts to Earth. The decision raises questions about the future of the Starliner program, with NASA only having placed firm orders for three Starliner flights and Boeing facing significant costs to ...

Bootstrap a Linux system from a 512 byte binary seed with 170 steps

https://opengraph.githubassets.com/7ca6d6bb53edc839aff1110f45e74055dd01da5ef3eaafdf766a58c07e31907d/fosslinux/live-bootstrap
The text describes the process of bootstrapping a Linux system from scratch, starting with a minimal kernel and gradually building a complete system with a C compiler, libraries, and tools, including Perl, Python, and GCC. The process involves a series of manual patches, workarounds, and rebuilds to overcome compatibility issues and ensure reproducibility, ultimately resulting in a fully ...

Show HN: Cursor AI Rules Directory (Open Source)

https://cursor.directory/opengraph-image.png?c574d9c0018e5368
Find the best cursor rules for your framework and language

PC Floppy Copy Protection: Formaster Copy-Lock

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZQg5nh-ZaKxyVNDoH8hRqu99iyTumwhwTh-sEYlSi_y0q3EFFfenDCVn9B_8hCQ6avgPFxMrlzsybK3gNhAw__u9QK45wbEQFmptw3Siy64jCBy8bFZYFfI99k9gsBgvYwh679D95tGPObyPMSWTkLOIJRDRvDlfbiGKRR7uzOC49xnTeOXpP_lEQ8PuA/w446-h640/formaster_large.jpg
The article discusses the Formaster Copy-Lock copy protection scheme used in the IBM PC version of King's Quest, which uses a non-standard sector size and a custom sector header to prevent unauthorized copying. The protection checks for the correct sector size and ID, and if the sector is read incorrectly, the program fails to run, making it difficult to copy the game without the original disk.

Man Arrested for Creating Child Porn Using AI

https://futurism.com/_next/image?url=https%3A%2F%2Fwordpress-assets.futurism.com%2F2024%2F08%2Fman-arrested-csam-ai.jpg&w=2048&q=75
A Florida man was arrested for creating and distributing AI-generated child pornography, highlighting the danger of generative AI being used for nefarious purposes. The arrest is part of a growing trend of generated AI child sexual abuse imagery, prompting lawmakers to push for legislation to make it illegal.

Why is a Guillotine blade diagonal?

http://pepijndevos.nl/style/wheel.png
A theoretical study compares the cutting efficiency of horizontal and diagonal guillotine blades, finding that the diagonal blade requires less force but more travel, with the same total energy required for a cut.

San Francisco officials weigh in on departure of X headquarters: 'Good riddance'

https://nypost.com/wp-content/uploads/sites/2/2016/08/fox-business.png?w=840
Elon Musk plans to move X's headquarters from San Francisco to Texas due to California's gender identity law, citing it as the "final straw" after other laws he deemed "attacking families and companies". San Francisco officials, including the city attorney and mayor, have expressed relief and indifference to the move, with some even welcoming the departure of the billionaire's business.

Marine worms made at least some trace fossil burrows called Bifungites

Scientists have discovered fossilized burrows, called Bifungites, which were previously thought to be empty, but now contain imprints of a small worm. The discovery, published in the journal Earth History and Biodiversity, reveals the invertebrates that made these burrows, a finding considered exciting by experts in the field.

What it's like to work on cold cases

Retired LA police officer Thomas Elfmont solved a 25-year-old Montana murder case, one of four cold cases solved in eight days, highlighting the rarity of such breakthroughs despite advances in forensic technology. Cold-case investigators, including retired officers, detectives, and civilian consultants, work tirelessly to solve cases, often facing roadblocks and sleepless nights.

Google's New Pipe Syntax in SQL

Google Research has developed a custom syntax for analytical SQL queries, called Pipe syntax, which aims to fix usability problems with standard SQL. The user successfully converted the research paper's PDF to HTML using Google's Gemini Pro model, but notes that the conversion is not perfect and lacks some figures and references.

Parochialism in time and space (2021)

https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F5a38f2e1-9a0c-4aee-9096-abae301cb9ce_725x394.png
The author argues that while we have become less geographically parochial due to increased global connectivity, we have become more historically parochial, with a lack of exposure to and interest in historical events and cultures outside of our own. The author suggests that this is due to the overwhelming amount of information produced in recent years, which has led to a focus on the present ...

Realistic Synthetic UGC: A Scaffolding Approach to Generating Online Discussions

https://arxiv.org/static/browse/0.3.4/images/icons/smileybones-infinity-large.png
Synthetic data can address data scarcity in domains with limited real data, and large language models can generate realistic social media discussion threads. However, a multi-step generation process is proposed to capture complex online discussion structures, with a framework adaptable to specific social media platforms and evaluation measures to ensure representativeness and realism.

How to run Valgrind on a CGI program in C

A programmer discovered a memory corruption bug in mod_blog that had existed for at least six years, which only manifested when doing a POST request. He used valgrind to debug the issue by capturing the environment variables and running the program under a web server, and then manually created a shell script to run valgrind with the captured environment variables.

Guide to Error Handling in Rust

https://www.howtocodeit.com/_next/image?url=https%3A%2F%2Fres.cloudinary.com%2Fdkh7xdo6x%2Fimage%2Fupload%2Fv1718910821%2Fthe_definitive_guide_to_rust_error_handling_0b8da55112.webp&w=640&q=75
The article discusses the importance of error handling in Rust, explaining the difference between dynamic and statically typed errors, and how to choose the right approach depending on the situation. It also introduces the concept of Box and how it can be used to handle errors, as well as the importance of designing only 'static error types and avoiding leaky abstractions.

How to verify boot firmware integrity if you prioritize neutralizing Intel ME?

Using me_cleaner to neutralize Intel ME also removes TPM, making it incompatible with boot verification technologies like Heads or AEM. The user discusses various methods to protect computer boot firmware, including a camera technique and a container or sticker approach, but notes that verifying firmware integrity is challenging.

Open Source Gerrymandering (2019)

https://www.aniszczyk.org/wp-content/uploads/2018/02/gerrymandering.png
The author discusses the importance of open governance in open source communities, highlighting examples of successful and unsuccessful governance models, including the Apache Software Foundation, Cloud Foundry Foundation, and others. The author emphasizes the need to read the fine print and understand how decisions are made and who has ownership of project assets, such as trademarks, to ...

Why fans of nuclear are a problem today

https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c7a4908-d2f9-48b0-aa67-a5e207de27ee_685x410.heic
Nuclear energy is no longer competitive with renewable alternatives and is struggling to be integrated into the energy system, making it difficult to finance and build new plants. Proponents of nuclear energy are wasting political capital and slowing down the transition to renewables by attacking and criticizing renewable energy, ultimately benefiting the fossil fuel industry.

The scalpel: From flint to zirconium-coated steel (2018)

https://www.facs.org/media/0rgp0qu2/scalpel_img2.png?rnd=133463668961100000
The scalpel, a surgical instrument, has evolved over 10,000 years from flint and obsidian cutting implements to modern technology with additional safety measures and coatings. The instrument's history reflects the evolution of surgery as a culture and profession, with various civilizations contributing to its development, including the Romans, Islamic Golden Age, and modern era.

Bananas almost went extinct 70 years ago – Now a deadly fungus is trying again

https://studyfinds.org/wp-content/uploads/2022/05/giorgio-trovato-4t0kofpmmnA-unsplash-scaled.jpg
A fungus called Fusarium oxysporum f.sp. cubense (Foc) tropical race 4 (TR4) is threatening the survival of Cavendish bananas, the world's most popular banana variety. Researchers have identified accessory genes in the fungus that are involved in making nitric oxide, which could lead to a plan to control the outbreak and potentially save the bananas from extinction.

Fair Source licensing is the worst thing to happen to open source-definitely ma (2016)

https://web.archive.org/web/20211107170120im_/https://www.techrepublic.com/a/hub/i/r/2016/04/01/a8dd214c-97fd-4cce-89c7-47a4bdb2d867/resize/620x/909843caf7bf5c9414cfd3a5546d43b0/dev.jpg
Fair Source is a licensing model that allows limited use of software for free, but charges for popular derivatives, which is seen as a flawed attempt to monetize software in a world that has moved towards open source and cloud-based services. The model is criticized for introducing unnecessary complexity and limiting developer freedom, and is seen as a misguided attempt to revive a outdated ...

Human population dynamics in Paleolithic inferred from fossil dental phenotypes

The study compiled a large dataset of dental nonmetric traits from European Upper Paleolithic to early Mesolithic Homo sapiens and applied a machine learning ABC framework to infer the population history of these hunter-gatherers. The results suggest that populations in the West and East were connected through gene flow during the Middle Pleniglacial, and that populations in the West went ...

Language Entropy

https://streams.place/images/logo.png
The author discusses the concept of language entropy, abstractness, and understanding, proposing a mathematical model to measure the complexity of written text based on word abstraction and entropy. The model takes into account the reader's knowledge base, represented by their familiarity with words, to calculate the final complexity of a sentence.

The long history of the word 'weird'

https://images2.minutemediacdn.com/image/upload/w_480/images/GettyImages/mmsport/mentalfloss/01j5nj51v9brn2h1ke3x.jpg
The word "weird" has evolved over centuries from an Old English noun meaning "fate" or "destiny" to an adjective describing the supernatural or strange, with its meaning broadening to encompass a wide range of unusual or unsettling things. The word has undergone a process of amelioration, softening and broadening its meaning to become a versatile term used to describe everything from magic to typos.

Electric vehicle battery fires–what to know and how to react

https://media.wired.com/photos/66c67367f003c7c199b8945f/master/w_2560%2Cc_limit/EV-Battery-Fires-Gear-1249135553.jpg
Lithium-ion battery fires in electric vehicles are rare and often caused by manufacturing defects, which can lead to intense and hard-to-extinguish flames. However, EVs are less likely to catch fire than traditional gas-powered vehicles, and proper safety measures and emergency procedures can minimize risks and ensure a safe response to an EV battery fire.

Show HN: Outperforming VByte for Large Integers Using Phi-Encoding

https://opengraph.githubassets.com/5e5d54fc75b03331776c20d8da17597d635ecf2aee44e95fed044c544d656d42/DOSAYGO-Research/irradix
The Phi-based encoding method outperforms VByte in terms of bit expansion for large integers, making it suitable for applications dealing with very large numbers. The study compares the efficiency of VByte and Phi-based encoding methods for compressing large integers, demonstrating the superiority of Phi-based encoding for large numbers.

Founder and CEO of Telegram arrested at French airport – report

Register or sign in with developer credentials and ensure a unique and descriptive User-Agent to access the script or application. If blocked, try changing back to default or file a ticket to discuss alternative access methods.

Real-world uplift modelling with significance-based uplift trees [pdf]

Extracting Pre-Post Correlations for Meta-Analyses of Repeated Measures Designs

https://matthewbjane.quarto.pub/pre-post-correlations/Figure_cor.png
The paper presents a systematic procedure for calculating pre-post correlations in meta-analyses of repeated measures designs, using a decision tree-like approach to prioritize exact methods over approximations. The procedure involves 9 scenarios, each addressing a specific combination of available statistics, and provides formulas for calculating pre-post correlations from various sources, ...

It's time to take a closer look at CVE-2024-38063 (Windows IPv6 RCE)

https://abs.twimg.com/responsive-web/client-web/icon-ios.77d25eba.png
We are letting you know that we are changing our URL, but your privacy and data protection settings remain the same.

Ask HN: Why not replace technical job interviews with yearly standardized exams?

The user argues that standardized exams for software developers would be ineffective and potentially gamed, and that they would not provide a comprehensive assessment of a candidate's skills and abilities. Instead, the user suggests that companies should focus on assessing a candidate's problem-solving skills, ability to learn, and fit with the company culture during the interview process.